
Known Exploited Vulnerabilities Catalog - CISA
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains …
CISA Adds Three Known Exploited Vulnerabilities to Catalog
Jul 28, 2025 · CISA has added three new vulnerabilities to its KEV Catalog, based on evidence of active exploitation.
Reducing the Significant Risk of Known Exploited Vulnerabilities
Learn about the importance of CISA's Known Exploited Vulnerability (KEV) catalog and how to use it to help build a collective resilience across the cybersecurity community.
2023 Top Routinely Exploited Vulnerabilities - CISA
Nov 12, 2024 · Technical Details Key Findings In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them …
Critical Vulnerabilities in Microsoft Windows Operating Systems
Jan 14, 2020 · An attacker could remotely exploit these vulnerabilities to decrypt, modify, or inject data on user connections: CryptoAPI spoofing vulnerability – CVE-2020-0601: This …
CISA Adds One Known Exploited Vulnerability to Catalog
Jul 10, 2025 · CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
Top Routinely Exploited Vulnerabilities Listed in Table 1 are the top 15 vulnerabilities the authoring agencies observed malicious cyber actors routinely exploiting in 2023 with details …
Top Routinely Exploited Vulnerabilities - CISA
Aug 20, 2021 · This advisory provides details on the top 30 vulnerabilities—primarily Common Vulnerabilities and Exposures (CVEs)—routinely exploited by malicious cyber actors in 2020 …
2021 Top Routinely Exploited Vulnerabilities - CISA
Apr 28, 2022 · These vulnerabilities include multiple vulnerabilities affecting internet-facing systems, including Accellion File Transfer Appliance (FTA), Windows Print Spooler, and Pulse …
Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities
Feb 12, 2025 · This Secure by Design Alert is part of an ongoing series aimed at advancing industry-wide best practices to eliminate entire classes of vulnerabilities during the design and …